PinnedPublished inGenerative AIBehind the scenes: How investigators identify cybercriminals with nothing but crumbs of evidenceA story about Group-IB‘s Investigations Team persistently piecing together the puzzle of cybercrimeApr 6, 2024Apr 6, 2024
PinnedThe history of scams, part 3: The global spreadHow scam groups expanded globally, what challenges they faced, and how they adaptedMar 22, 2024Mar 22, 2024
PinnedPublished inOSINT TeamCyberthreats in 2024: Forecasts for the coming year from Group-IB expertsGroup-IB identifies the top cybersecurity trends for 2024Mar 18, 2024Mar 18, 2024
PinnedPublished inGenerative AIGroup-IB from the inside: Who we are and how big dreamers become global championsA snap of our culture, values, and traditionsMar 7, 2024Mar 7, 2024
PinnedCybercrime as a service: 7 real-life examples (with pictures)Subscription services that hackers use to conduct attacksFeb 9, 2024Feb 9, 2024
The history of scams: Part 2Distinct schemes, roles within scam groups, and scammer subcultureMar 1, 2024Mar 1, 2024
Published inOSINT TeamAI in the wrong hands: New iOS Trojan challenges face recognitionKey details about the new tool stealing biometric dataFeb 22, 2024Feb 22, 2024
Goodbye Inferno Drainer?How the scam service stole millions of dollars and why it’s still dangerousJan 18, 2024Jan 18, 2024
The history of scams: Part 1How petty theft online grew into an organized criminal marketJan 12, 2024Jan 12, 2024
Protecting against the seasonal spike in ransomware attacks: Lessons from Home AloneWith Christmas already past and the New Year approaching, people around the globe are spending time with their families, watching holiday…Dec 29, 2023Dec 29, 2023